{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:50:52Z","timestamp":1772499052570,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T00:00:00Z","timestamp":1597017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T00:00:00Z","timestamp":1597017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11277-020-07680-w","type":"journal-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T11:02:50Z","timestamp":1597057370000},"page":"2243-2268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain"],"prefix":"10.1007","volume":"115","author":[{"given":"Arslan","family":"Shafique","sequence":"first","affiliation":[]},{"given":"Fawad","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,10]]},"reference":[{"key":"7680_CR1","unstructured":"Furht, B., & Socek. D. (2003). A survey of multimedia security. Comprehensive report on. https:\/\/www.researchgate.net\/profile\/Borko_Furht\/publication\/228702662_A_Survey_of_Multimedia_Security\/links\/57b7020108aecd6720139bc4\/A-Survey-of-Multimedia-Security.pdf."},{"issue":"4","key":"7680_CR2","first-page":"263","volume":"1","author":"A Abusukhon","year":"2012","unstructured":"Abusukhon, A., Talib, M., & Ottoum, I. (2012). Secure network communication based on text-to-image encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(4), 263\u2013271.","journal-title":"International Journal of Cyber-Security and Digital Forensics (IJCSDF)"},{"key":"7680_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1840207","author":"A Anees","year":"2018","unstructured":"Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A robust watermarking scheme for online multimedia copyright protection using new chaotic map. Security and Communication Networks. https:\/\/doi.org\/10.1155\/2018\/1840207.","journal-title":"Security and Communication Networks"},{"key":"7680_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed, F. & Anees, A. (2015). Hash-based authentication of digital images in noisy channels. In Robust image authentication in the presence of noise (pp.\u00a01\u201342). Springer.","DOI":"10.1007\/978-3-319-13156-6_1"},{"issue":"2","key":"7680_CR5","first-page":"1","volume":"6","author":"D Selent","year":"2010","unstructured":"Selent, D. (2010). Advanced encryption standard. Rivier Academic Journal, 6(2), 1\u201314.","journal-title":"Rivier Academic Journal"},{"key":"7680_CR6","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. M. (1983). Cryptographic communications system and method. US Patent 4405829."},{"key":"7680_CR7","unstructured":"Mahajan, P., & Sachdeva, A. (2013). A study of encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology, 13(15). https:\/\/computerresearch.org\/index.php\/computer\/article\/view\/272."},{"key":"7680_CR8","doi-asserted-by":"crossref","unstructured":"Ahmed, F., Siyal, M., & Abbas, V. U. (2010) A perceptually scalable and jpeg compression tolerant image encryption scheme. In 2010 Fourth Pacific-Rim Symposium on Image and Video Technology (PSIVT) (pp.\u00a0232\u2013238). IEEE.","DOI":"10.1109\/PSIVT.2010.46"},{"issue":"2","key":"7680_CR9","doi-asserted-by":"crossref","first-page":"140","DOI":"10.3390\/sym11020140","volume":"11","author":"A Anees","year":"2019","unstructured":"Anees, A., & Hussain, I. (2019). A novel method to identify initial values of chaotic maps in cybersecurity. Symmetry, 11(2), 140.","journal-title":"Symmetry"},{"key":"7680_CR10","doi-asserted-by":"crossref","unstructured":"Anees, A., & Siddiqui, A. M. (2013) A technique for digital watermarking in combined spatial and transform domains using chaotic maps. In 2013 2nd national conference on information assurance (NCIA) (pp.\u00a0119\u2013124). IEEE.","DOI":"10.1109\/NCIA.2013.6725335"},{"issue":"2","key":"7680_CR11","first-page":"317","volume":"49","author":"I Hussain","year":"2019","unstructured":"Hussain, I., Anees, A., Alkhaldi, A. H., Aslam, M., Siddiqui, N., & Ahmed, R. (2019). Image encryption based on Chebyshev chaotic map and S8 S-boxes. Optica Applicata, 49(2), 317\u2013330.","journal-title":"Optica Applicata"},{"issue":"6","key":"7680_CR12","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1080\/02564602.2018.1533892","volume":"36","author":"B Panna","year":"2019","unstructured":"Panna, B., Kumar, S., & Jha, R. K. (2019). Image encryption based on block-wise fractional Fourier transform with wavelet transform. IETE Technical Review, 36(6), 600\u2013613.","journal-title":"IETE Technical Review"},{"issue":"4","key":"7680_CR13","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11071-013-1105-3","volume":"75","author":"A Anees","year":"2014","unstructured":"Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807\u2013816.","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"7680_CR14","doi-asserted-by":"crossref","first-page":"351","DOI":"10.3390\/sym11030351","volume":"11","author":"I Hussain","year":"2019","unstructured":"Hussain, I., Anees, A., Al-Maadeed, T. A., & Mustafa, M. T. (2019). Construction of S-box based on chaotic map and algebraic structures. Symmetry, 11(3), 351.","journal-title":"Symmetry"},{"key":"7680_CR15","doi-asserted-by":"crossref","first-page":"173273","DOI":"10.1109\/ACCESS.2019.2956385","volume":"7","author":"SS Jamal","year":"2019","unstructured":"Jamal, S. S., Anees, A., Ahmad, M., Khan, M. F., & Hussain, I. (2019). Construction of cryptographic S-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access, 7, 173273\u2013173285.","journal-title":"IEEE Access"},{"issue":"9","key":"7680_CR16","doi-asserted-by":"crossref","first-page":"3106","DOI":"10.1016\/j.cnsns.2014.02.011","volume":"19","author":"A Anees","year":"2014","unstructured":"Anees, A., Siddiqui, A. M., & Ahmed, F. (2014). Chaotic substitution for highly autocorrelated data in encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 19(9), 3106\u20133118.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"7680_CR17","doi-asserted-by":"crossref","first-page":"105777","DOI":"10.1016\/j.optlastec.2019.105777","volume":"121","author":"MB Farah","year":"2020","unstructured":"Farah, M. B., Guesmi, R., Kachouri, A., & Samet, M. (2020). A novel chaos based optical image encryption using fractional Fourier transform and dna sequence operation. Optics & Laser Technology, 121, 105777.","journal-title":"Optics & Laser Technology"},{"issue":"2","key":"7680_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjp\/s13360-020-00187-0","volume":"135","author":"A Shafique","year":"2020","unstructured":"Shafique, A. (2020). A new algorithm for the construction of substitution box by using chaotic map. The European Physical Journal Plus, 135(2), 1\u201313.","journal-title":"The European Physical Journal Plus"},{"issue":"4","key":"7680_CR19","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1016\/j.cjph.2018.04.013","volume":"56","author":"I Hussain","year":"2018","unstructured":"Hussain, I., Anees, A., AlKhaldi, A. H., Algarni, A., & Aslam, M. (2018). Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications. Chinese Journal of Physics, 56(4), 1609\u20131621.","journal-title":"Chinese Journal of Physics"},{"issue":"6\u20137","key":"7680_CR20","doi-asserted-by":"crossref","first-page":"479","DOI":"10.5560\/zna.2013-0022","volume":"68","author":"A Anees","year":"2013","unstructured":"Anees, A., Khan, W. A., Gondal, M. A., & Hussain, I. (2013). Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption. Zeitschrift f\u00fcr Naturforschung A, 68(6\u20137), 479\u2013482.","journal-title":"Zeitschrift f\u00fcr Naturforschung A"},{"issue":"3","key":"7680_CR21","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s13319-015-0059-2","volume":"6","author":"A Anees","year":"2015","unstructured":"Anees, A. (2015). An image encryption scheme based on Lorenz system for low profile applications. 3D Research, 6(3), 24.","journal-title":"3D Research"},{"issue":"4","key":"7680_CR22","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1140\/epjp\/i2018-11987-x","volume":"133","author":"I Hussain","year":"2018","unstructured":"Hussain, I., Anees, A., Aslam, M., Ahmed, R., & Siddiqui, N. (2018). A noise resistant symmetric key cryptosystem based on s 8 s-boxes and chaotic maps. The European Physical Journal Plus, 133(4), 167.","journal-title":"The European Physical Journal Plus"},{"issue":"2","key":"7680_CR23","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s13319-015-0049-4","volume":"6","author":"A Anees","year":"2015","unstructured":"Anees, A., & Gondal, M. A. (2015). Construction of nonlinear component for block cipher based on one-dimensional chaotic map. 3D Research, 6(2), 17.","journal-title":"3D Research"},{"key":"7680_CR24","doi-asserted-by":"crossref","unstructured":"Bhamidipati, K., & Annadurai, S. (2020) Permutation\u2013substitution based image encryption algorithms using pseudorandom number generators. In Handbook of computer networks and cyber security (pp.\u00a0825\u2013848). Springer.","DOI":"10.1007\/978-3-030-22277-2_33"},{"issue":"11","key":"7680_CR25","doi-asserted-by":"publisher","first-page":"7045","DOI":"10.1007\/s00521-019-04207-8","volume":"32","author":"A Anees","year":"2019","unstructured":"Anees, A., & Chen, Y.-P. P. (2019) Designing secure substitution boxes based on permutation of symmetric group. Neural Computing and Applications, 32(11), 7045\u20137056. https:\/\/doi.org\/10.1007\/s00521-019-04207-8.","journal-title":"Neural Computing and Applications"},{"key":"7680_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-020-00730-3","author":"A Shafique","year":"2020","unstructured":"Shafique, A. & Ahmed, J. (2020). Dynamic substitution based encryption algorithm for highly correlated data. Multidimensional Systems and Signal Processing. https:\/\/doi.org\/10.1007\/s11045-020-00730-3.","journal-title":"Multidimensional Systems and Signal Processing"},{"issue":"4","key":"7680_CR27","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Labs Technical Journal, 28(4), 656\u2013715.","journal-title":"Bell Labs Technical Journal"},{"key":"7680_CR28","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua, Z., Zhou, Y., Pun, C.-M., & Chen, C. P. (2015). 2d sine logistic modulation map for image encryption. Information Sciences, 297, 80\u201394.","journal-title":"Information Sciences"},{"issue":"7","key":"7680_CR29","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"N Pareek","year":"2005","unstructured":"Pareek, N., Patidar, V., & Sud, K. (2005). Cryptography using multiple one-dimensional chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 10(7), 715\u2013723.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"5","key":"7680_CR30","doi-asserted-by":"crossref","first-page":"395","DOI":"10.4103\/0256-4602.103173","volume":"29","author":"MK Mandal","year":"2012","unstructured":"Mandal, M. K., Banik, G. D., Chattopadhyay, D., & Nandi, D. (2012). An image encryption process based on chaotic logistic map. IETE Technical Review, 29(5), 395\u2013404.","journal-title":"IETE Technical Review"},{"key":"7680_CR31","unstructured":"Hussain, I., Anees, A., Al-Maadeed, T. A., & Mustafa, M. (2020). A novel encryption algorithm using multiple semifield s-boxes based on permutation of symmetric group. arXiv preprint arXiv:2004.12264."},{"issue":"3\u20134","key":"7680_CR32","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1007\/s00521-012-1035-x","volume":"23","author":"MA Gondal","year":"2013","unstructured":"Gondal, M. A., & Anees, A. (2013). Analysis of optimized signal processing algorithms for smart antenna system. Neural Computing and Applications, 23(3\u20134), 1083\u20131087.","journal-title":"Neural Computing and Applications"},{"issue":"1","key":"7680_CR33","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z-H Guan","year":"2005","unstructured":"Guan, Z.-H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1), 153\u2013157.","journal-title":"Physics Letters A"},{"issue":"20","key":"7680_CR34","doi-asserted-by":"crossref","first-page":"2638","DOI":"10.1016\/j.physd.2008.03.049","volume":"237","author":"A Pisarchik","year":"2008","unstructured":"Pisarchik, A., & Zanin, M. (2008). Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenomena, 237(20), 2638\u20132648.","journal-title":"Physica D: Nonlinear Phenomena"},{"key":"7680_CR35","doi-asserted-by":"crossref","unstructured":"Sam, I. S., Devaraj, P., & Bhuvaneswaran, R. S. (2011). Chaos based image encryption scheme based on enhanced logistic map. In ICDCIT (pp.\u00a0290\u2013300). Springer.","DOI":"10.1007\/978-3-642-19056-8_22"},{"issue":"1\u20132","key":"7680_CR36","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s11071-013-1068-4","volume":"75","author":"X Zhang","year":"2014","unstructured":"Zhang, X., & Zhao, Z. (2014). Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics, 75(1\u20132), 319\u2013330.","journal-title":"Nonlinear Dynamics"},{"issue":"10","key":"7680_CR37","doi-asserted-by":"crossref","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"H Liu","year":"2010","unstructured":"Liu, H., & Wang, X. (2010). Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications, 59(10), 3320\u20133327.","journal-title":"Computers & Mathematics with Applications"},{"issue":"3","key":"7680_CR38","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1007\/s11277-015-2295-4","volume":"82","author":"A Anees","year":"2015","unstructured":"Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), 1497\u20131503.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"7680_CR39","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1007\/s11071-015-2281-0","volume":"82","author":"J Ahmad","year":"2015","unstructured":"Ahmad, J., & Hwang, S. O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1839\u20131850.","journal-title":"Nonlinear Dynamics"},{"issue":"1\u20132","key":"7680_CR40","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1007\/s11071-013-0832-9","volume":"73","author":"X Wang","year":"2013","unstructured":"Wang, X., & Liu, L. (2013). Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics, 73(1\u20132), 795\u2013800.","journal-title":"Nonlinear Dynamics"},{"key":"7680_CR41","doi-asserted-by":"crossref","unstructured":"Chen, X., Di, X., Li, J., Zhao, J., & Liu, X. (2019). Medical image region of interest encryption combined with discrete wavelet transform and hyperchaotic system. In Tenth international conference on graphics and image processing (ICGIP 2018) (Vol.\u00a011069, p.\u00a0110692O). International Society for Optics and Photonics.","DOI":"10.1117\/12.2524454"},{"key":"7680_CR42","unstructured":"Ali\u00a0Khan, F., Ahmed, J., Ahmad, J., Khan, J. S., Ahmad, F., Stankovic, V., et al. (2019). A novel chaos-based partial image encryption scheme using lifting wavelet transform. In The first international nonlinear dynamics conference."},{"issue":"3","key":"7680_CR43","first-page":"1","volume":"19","author":"W-W Hu","year":"2020","unstructured":"Hu, W.-W., Zhou, R.-G., Luo, J., Jiang, S.-X., & Luo, G.-F. (2020). Quantum image encryption algorithm based on Arnold scrambling and wavelet transforms. Quantum Information Processing, 19(3), 1\u201329.","journal-title":"Quantum Information Processing"},{"key":"7680_CR44","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. Boca Raton: CRC Press."},{"key":"7680_CR45","volume-title":"Applied cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier, B. (1996). Applied cryptography. New York: Wiley."},{"key":"7680_CR46","doi-asserted-by":"crossref","unstructured":"Flayh, N. A., Parveen, R. & Ahson, S. I. (2009). Wavelet based partial image encryption. In Multimedia, signal processing and communication technologies, 2009. IMPACT\u201909. International (pp.\u00a032\u201335). IEEE.","DOI":"10.1109\/MSPCT.2009.5164167"},{"issue":"8","key":"7680_CR47","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng, H., & Li, X. (2000). Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8), 2439\u20132451.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"7680_CR48","doi-asserted-by":"crossref","DOI":"10.1201\/9781420065282","volume-title":"Multimedia content encryption: Techniques and applications","author":"S Lian","year":"2008","unstructured":"Lian, S. (2008). Multimedia content encryption: Techniques and applications. Boca Raton: CRC Press."},{"key":"7680_CR49","doi-asserted-by":"crossref","unstructured":"Rodrigues, J. M., Puech, W., & Bors, A. G. (2006). Selective encryption of human skin in jpeg images. In 2006 IEEE international conference on image processing (pp.\u00a01981\u20131984). IEEE.","DOI":"10.1109\/ICIP.2006.312886"},{"key":"7680_CR50","doi-asserted-by":"crossref","unstructured":"Elabady, N., Abdalkader, H., Moussa, M., & Sabbeh, S. F. (2014). Image encryption based on new one-dimensional chaotic map. In 2014 international conference on engineering and technology (ICET), (pp.\u00a01\u20136). IEEE.","DOI":"10.1109\/ICEngTechnol.2014.7016811"},{"key":"7680_CR51","volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"J Daemen","year":"2013","unstructured":"Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. New York: Springer."},{"issue":"4","key":"7680_CR52","doi-asserted-by":"crossref","first-page":"2771","DOI":"10.1007\/s11277-014-1667-5","volume":"77","author":"F Ahmed","year":"2014","unstructured":"Ahmed, F., Anees, A., Abbas, V. U., & Siyal, M. Y. (2014). A noisy channel tolerant image encryption scheme. Wireless Personal Communications, 77(4), 2771\u20132791.","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"7680_CR53","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1140\/epjp\/i2018-12138-3","volume":"133","author":"A Shafique","year":"2018","unstructured":"Shafique, A., & Shahid, J. (2018). Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. The European Physical Journal Plus, 133(8), 331.","journal-title":"The European Physical Journal Plus"},{"issue":"3","key":"7680_CR54","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749\u2013761.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"1","key":"7680_CR55","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514\u2013522.","journal-title":"Applied Soft Computing"},{"issue":"16","key":"7680_CR56","first-page":"4110","volume":"6","author":"T Shah","year":"2011","unstructured":"Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of s-box in image encryption applications based on majority logic criterion. International Journal of Physical Sciences, 6(16), 4110\u20134127.","journal-title":"International Journal of Physical Sciences"},{"issue":"12","key":"7680_CR57","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang, G., & Liu, Q. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284(12), 2775\u20132780.","journal-title":"Optics Communications"},{"key":"7680_CR58","doi-asserted-by":"crossref","unstructured":"Elkamchouchi, H. & Makar, M. (2005) Measuring encryption quality for bitmap images encrypted with Rijndael and Kamkar block ciphers. In Radio science conference, 2005. NRSC 2005. Proceedings of the twenty-second national (pp.\u00a0277\u2013284). IEEE.","DOI":"10.1109\/NRSC.2005.194011"},{"key":"7680_CR59","doi-asserted-by":"crossref","first-page":"36667","DOI":"10.1109\/ACCESS.2019.2906292","volume":"7","author":"A Belazi","year":"2019","unstructured":"Belazi, A., Talha, M., Kharbech, S., & Xiang, W. (2019). Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access, 7, 36667\u201336681.","journal-title":"IEEE Access"},{"key":"7680_CR60","doi-asserted-by":"crossref","first-page":"103463","DOI":"10.1109\/ACCESS.2019.2929244","volume":"7","author":"LO Tresor","year":"2019","unstructured":"Tresor, L. O., & Sumbwanyambe, M. (2019). A selective image encryption scheme based on 2d DWT, Henon map and 4d Qi hyper-chaos. IEEE Access, 7, 103463\u2013103472.","journal-title":"IEEE Access"},{"issue":"8","key":"7680_CR61","doi-asserted-by":"crossref","first-page":"10013","DOI":"10.1007\/s11042-018-6612-2","volume":"78","author":"YPK Nkandeu","year":"2019","unstructured":"Nkandeu, Y. P. K., & Tiedeu, A. (2019). An image encryption algorithm based on substitution technique and chaos mixing. Multimedia Tools and Applications, 78(8), 10013\u201310034.","journal-title":"Multimedia Tools and Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07680-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07680-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07680-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T23:49:38Z","timestamp":1628552978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07680-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,10]]},"references-count":61,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7680"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07680-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,10]]},"assertion":[{"value":"10 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}